Networking
Connecting of two or more then two computers or
computer devices with each other in order to share
software's , data and Resources is called Network
Data: = files and folders
Resource: = printers –cd rom etc.
Benefits of Network
1- sharing of software's
2-sharing of hardware’s
3- sharing of data
4- sharing resources
5- To Save Time
6- To save Money
Devices for Making Network
1- computer
2- cable
3- Rj45
4- Switch
5- Router
6-ip
7- Access Point
8- Persons
Kinds of network
Physical network Logical network
workgroup Domain
LAN MAN WAN
Peer to peer Client
Types of Network
• 1: LAN 2: MAN 3: WAN 4: SAN 5:PAN
• 1: LAN: - (Local Area Network)
• Network in a small geographic area is called LAN
• OR network within a building or two near buildings.
• It’s cheap, secure and fast .
2:- MAN: - (Metropolitan Area Network)
Is a network which exists in a medium geographic area.
like network in a small cities, towns or branch offices
Less secure, less fast and expensive than LAN.
3: WAN: - (Wide Area Network)
It exists in a wide geographic area.
OR network between cities, countries is called WAN
Internet is a good example of WAN
less fast and more expensive.
LOGICAL NETWORK It exists logically
Types of Logical Network
1: Work Group 2: Domain
1: Work Group
It’s a simple network in which All computers has its own rights .
No control from other computers. workgroup name must be same for better
communication.
PC name and IP address will be different.
2: Domain
In a domain network security boundaries are defined for computers, users, Groups and
other objects.
TOPOLOGY
The Physical shape and design of network is called topology
Types of Topology
1: Bus Topology.
2: Ring Topology.
3: Star Topology.
4: Mesh Topology.
5. Hierarchical topology.
6. Extended star Topology.
Bus Topology
In this topology all network devices are
connected to central line
If this line breaks all network will go down
Speed is slow
Ring Topology
In this topology all network devises are
connected in circular shape
Speed is faster than Bus Topology. If a single line
breaks all network will go down.
Star Topology
In this topology all network devices are connected to a
central point called Hub or Switch
Speed is fast, now it’s used the most, it’s secure
Mesh Topology
All network devices are connected to each other with a
separate line
Expensive but Reliable
Now it’s used in WAN .
Extended star topology
The collection of star topology is called extend star topology.
Hieratical topology
Hierarchical topology – system is linked to a computer that
controls the traffic on the topology.
=> mobile company use more this topology.
NETWORK DEVICES
Any device that has a network interface in order to communicate to another device is
called network device
Bluetooth can be a network device
1: LAN Card or NIC 2: HUB 3: SWITHCH 4: ROUTER
LAN CARD OR NIC
(Local Area Network Card or Network Interface Card)
It connects our computer to media or cables
It has wireless and wired
It has physical address which is unique MAC(Media Access control) address
We assign IP address to it .
HUB
=> Hub is a central point for our network.
It’s called not intelligent, device because it doesn’t know MAC (Media Access Control)
It does broadcast = send to all
Speed is slower than Switch and not secure
SWITCH
Switch is a central point too.
Intelligent device because it knows MAC address
Speed is fast and secure, it do unicast and multicast also broadcast.
Unicast = send to one
Multicast = send to many
Broadcast = send to all
Switch has many types of ports like.
Ethernet = 10 Mbps
Fast Ethernet = 100 Mbps
Gigabit = 1000 Mbps
Fiber
ROUTER
It connects different networks with each other
Like, LAN with WAN or LAN’s
And router find best path to reach destination.
Wireless Access Point
It connects our mobile devices to our network.
like laptops, Mobiles, and desktops which has wireless NIC Card.
Wi-Fi stands for (Wireless Fidelity)
which is compatible with 802.11b,g and n standard.
Connecting Devices
Connecting devices
Internet working devices
Networking devices Gateways Router
1. Change the format of data. Resolution change. 8,16,24 ports, it
repeat the signal,
Repeater 2. Not change format more ports then repeater intelligent device
know the mac address.
3. Connect two or more networks wireless also has, it use in the hub
switch time use between hubs
4. Not intelligent device. Before switch it used 8,16,24,32 ports has.
bridges Does not know the mac address it broadcast to all.
5. It is a device which is used for internet LAN with LAN and LAN
with man. Power full intelligent.
HUB 6. It is border between two networks, between ISP and company.
MEDIA
Something that carries a message from one place to another
is called media.
Types of Network Media
1: Unbounded (Wireless Media) 2: Bounded (Wired Media)
Unbounded (Wireless Media) :
it is exists in air, it’s not secure . Wireless media
can moves through obstacles. (problem)
Bluetooth Radio Frequency Satellite Waves Micro Waves
Three types of cabling
1. Twisted-Pair or Copper Cable.
2. Coaxial Cable 200/500 meters. Or copper cable
3. Fiber- optic cable.
2nd: Bounded (Wired Media)
data is moved in wires, its secure
Types of wired media
Copper media
Twisted Paired Cable Coaxial Cable
UTP (Unshielded Twisted Paired) STP (Shielded Twisted Paired)
Twisted paired Cable (TPC)
This cable has four pairs and eight wires in different colors
Types TPC (Twisted Paired Cable)
STP (Shielded Twisted Paired)
UTP (Unshielded Twisted Paired)
STP (Shielded Twisted Paired)
It has extra shield against (EMI) Electric Magnetic Interface
UTP (Unshielded Twisted Paired) cable
No extra shield on it
Categories of TPC (Twisted Paired Cable)
1. category. = voice only phone.
2. category. = data to 4mbps.
3. category
4. category
Cat 5: this cable works up to 100 meters, speed is 100 Mbps
Cat 5e: this cable works up to 100 meters, speed is 1000 Mbps
Cat 6: this cable works up to 200 meters, speed is 1000 Mbps
Cat 7: , transmits data at a rate of up to 10000Mbps.
Coaxial Cable
This cable was used for network
Now replaced by TPC used for TV etc. work up to 180 meters 10 Mbps.
Cabling Standard
For TPC we use RJ45 connector (Register Jack45)
For telephone line we use RJ11
CRIMPING TOOL
It Is used for connecting RJ 45 and RJ 11 ,RJ4 Connectors with cable
CABILING STANDARD (Wiring)
1: Straight Cable 2: Cross Cable 3: Rollover Cable
Straight Cable is used for connecting different devices
Like: Hub with Switch / computer with Switch etc.
Note: in new technology
it can also be used for same devices
Like: computer with computer / Switch with Switch
Straight Cable
Cross Cable
It is used for connecting same devices to each other
Like: Hub With Hub / Computer with Computer etc.
Cross Cable Formula B Cross Cable Formula A
Note: in cabling just 4 wires are used for data which are 1,2,3,6 and wires of 4,5,7,8 are used for protection.
ROLLOVER CABLE (CONSOL CABLE)
Is used for configuring Routers and Switches
one side of this cable is like standard A and other side is opposite of side A.
mean start the side B: brown ,white brown, green, white blue, blue, white green, orange, white
orange.
Fiber Optic Cable
This cable is made of glass and data is moved through light pulses.
This cable is fast and expensive.
Installation of this cable need skill, used in long distance
MEDIA CONVERTER
This device convert data of one media to another
IP (Internet Protocol)
A protocol is set of rules and procedures used for communication.
A computer on a network must agree upon a common protocol in order to
communicate
Example: IP (Internet Protocol)
TCP /IP ( Transmission Control Protocol / Internet Protocol)
It’s a bunch of protocol
BINARY
Binary is computer language
Binary has two digits 0 and 1
0 = off counted as 0: example 00000000=0
1 = on counted as its own value where it’s placed
Or 1byte = 8 bits
Each byte can take value from 0 to 255.
From 0 to 9 is decimal
128 64 32 16 8 4 2 1
0 0 0 0 0 0 0 0 =1 byte
Decimal = 8
Binary = 00001000= 8 18 = 00010010 128= 10000000
Examples:
31= 00011111 00011111= 1byte 35 =00100011 128= 10000000
141= 10001101
202= 11001010
254= 11111110
230= 11100110
180= 10110100
11111111= 255
IP ADDRESS (Internet Protocol)
Versions of IP address
1st: version 4
2nd: version 6
IP address internet protocol version 4
It’s a numeric identifier in a network each network device must has an IP address in order to
communicate.
It is 4 Byte 32 bit
Each byte take value from 0 to 255.
Example: [Link] [Link]
[Link] [Link]
[Link]
CLASSES OF ADDRESSES
In IP address we have 5 classes in which 3 of them are used A, B and C are used
in common
Network class D and E are used for their purpose.
IANA (internet Assigned Numbers Authority)
It Is a company which has made IP address and also this company has classified IP
address.
This company is located in USA and also this company has sold the IP address to all the
people
CLASS A
Its first byte from left must be between 1 to 127
Subnet Mask by default in class A is [Link]
EX: [Link] [Link] [Link] [Link] , [Link], [Link]
CLASS B
Its first byte from left must be between 128 to 191
Ex: [Link] , [Link], [Link] , [Link] ,[Link].
[Link]
subnet mask: [Link]
CLASS C
Its first byte from left must be between 192 to 223.
Ex: [Link] Ex: [Link] ,[Link] [Link]
Subnet Mask: [Link]
CLASS D and E
It’s used and reserved for troubleshooting
Class D: from 224 to 239
Class E: from 240 to 255
Ex: [Link]
NOTE:
In class A 127 from left could not be assigned, it’s called loopback address used for
checking of network card (NIC)
Ex: [Link]
[Link] To [Link] this address is reserved
for apipa (automatic privet IP address)
How to check status of LAN CARD? Run-cmd-ping
[Link]
SUBNET MASK
Subnet Mask shows network portion and host portion in an IP address.
Network Portion: this portion is portion where computers sets, network portion must be
same in all PC’s in the same network. 255 in subnet mask shows network portion.
Example: [Link]
Subnet Mask: [Link]
Note: 255 shows network portion because in subnet mask is equal to 1 or on in binary
Network portion must be same
[Link]
[Link]
Network Network Host Host
[Link]
Because same IP
[Link]
[Link] [Link] 172.16.0. 2
HOST PORTION
It must be different in all PC’s in our same network and in subnet mask in binary host portion is equal
To zero 0 or off
BINARY:
NETWORK ID
When in an IP all host bits are equal to zero 0 or off is not assigned to computer
Example: [Link] [Link] Ex: [Link]
Subnet Mask: [Link] [Link]
1st IP: [Link] up to 255 for each network [Link] 0.1 [Link]
BROADCAST IP
When all host bits are on or 1, it could not be assigned to PC’s
10. 0 . 0 .0 = network ID
255.0.0. 0 10.0.0. 1st IP
[Link] last IP or broadcast IP
[Link] = last valid IP
[Link] [Link] , [Link] br: [Link] [Link]
[Link] , [Link] , [Link] ,[Link].
[Link]
[Link]
[Link] up to
[Link] Broadcast IP
CLASS A
CLASS A [Link] = Network ID
[Link] 0 off
[Link] [Link] = First IP
N H [Link]= 240TH IP
[Link] = Broadcast IP
[Link] = another Network
CLASS B [Link] = network ID
[Link] [Link] = SUBNET Mask
[Link] [Link] = first IP
N H [Link] = another ID
[Link] = 1st IP
[Link] = Broadcast
[Link] = Last Valid IP
CLASS C [Link] = Network ID
[Link] = Subnet Mask
[Link] [Link] = First IP
[Link] [Link] = Broadcast
N H [Link] = Last Valid IP
[Link] = Another Network
PRIVATE and PUBLIC IP’s
Private IP Addresses are free of cost, they could be used
in many places at once
In internet many private IP’s are changed to public IP’s .
RANGES
Class A:
[Link] to [Link] Free of cost
[Link] Not free of cost must be paid
Class B:
[Link] to [Link]
15 networks are free of cost from 16 to 31
Class C:
[Link] to [Link]
255 networks are free of cost
Public IP Addresses
these IP’s are not free we must buy it from ISP (Internet Service Provider)
Mostly they are assigned to webserver, FTP server (File Transfer Protocol)
PRACTICAL DAY
Assigning an IP Address to a line card
By three ways we can assign IP address to a PC
Manually = on each PC we assign an IP manually
Automatically = each computer will take an IP from DHCP server
APIPA (Automatic Private IP Address)
If DHCP server is not available then it will take it from APIPA
STEPS
Control panel > network and sharing center > change adaptor settings
We just can assign IP to adaptor like wired and wireless LAN cards
Right click on local area connection > properties > internet protocol version 4 (TCP/IPv4)
Properties use the following IP address
IP address automatically
Use the following IP address
IP address automatically = DHCP
Use the following IP address = MANUALLY
Note: right click on Local Area Connection > status >
Properties > detail = it shows network connection detail
COMMANDS FOR IP
IP Config = shows less information about our PC
IP Config /all = shows more information about our computers
Run >CMD > ipconfig> enter
Run > CMD > ipconfig/all > enter
Communication
To check communication we use ping command
Ex: run > cmd > ping [Link] or name of another computer
Like ping PC1 (ping Google .com)
Request = mean no communication
Reply from IP that we pinged mean communication OK
Destination host unreachable = no communication
or request time out = no communication or general failure
Ping [Link] –t = it continually send ping request
To stop ctrl + c
Ping [Link] –n 20 = ping 20 times
Computer Name
we can also communicate on computers names. but we must have an IP address.
Virtualization
In MCITP for virtualization we will use different software VMware and hyper – V hyper.
VMware (virtual machine)
To run more virtual machine at a time in one computer. for networking and other purposes we use
VMware.
Versions
Version 7
Version 9
Requirements
For MCITP minimum 3 GB ram.
30 GB free space for more than one operating system
Processor minimum core 2 duo 2.3 if it support 64 bit preferred for R2 server 2008.
SHARING and network access
Through sharing we can share files and accesses it through network accesses in another PC
Member of administrators and power users can share a folder.
permission
Read = open copy
Change = edit, delete, write data
Full control = full control even can change permission.
Advanced sharing
in another computer how to access it
\\[Link] or \\noor-pc
Hidden Share
Through hidden share if we share a folder the users who know its share
name can access it .because it’s hidden. We use dollar $ sign with share
name. ali$
To access \\ip\sharename$
Example: \\[Link]\myfolder$
Note: all drives are shared as hidden share for administrator purpose
MAP NETWORK DRIVE
Through map network drive we can show folder from another PC as a drive.
How to manage share folder?
REMOTE DESKTOP CONNECTION
Through remote desktop connection we can access
desktop of another computer.
Just member of administrator and remote desktop users
can login to that computer.
To login to another computer
Run > MSTSC > IP or computer name of another
computer
Remote Assistant
Through remote assistant we invite someone to access our desktop with and without control.
the person must access the invitation through email or shared folder.
Computer A want to invite computer B to access its desktop.
[Link] computer A make an invitation and put it in a shared folder.
B. access shared folder and open invitation and give password which is located in computer A.
Server manager
from server manager we can perform different task or see some information.
from here we can add ,remove role feature etc.
Role
In windows server 2008 we have roles. which perform major tasks. in some role there is role
service. dns, active directory domain services ,hyper-v,web server, Files server, DFS role service,
quota management, file screening role service.
role service